Anti Spam

Anti spam solutions generally fall under two categories, client-based and server-based. Client-based tools allow each user to configure the software so that it can perform according to individual needs with it’s decentralized approach. Server-based solutions perform spam identification and filtering before legitimate emails are distributed to the intended recipients throughout the network thus reducing the impact that spam has on end-user productivity and on network resources.
Results 1 - 25 of 456Sort Results By: Published Date | Title | Company Name
White Paper Published By: Grey Matter     Published Date: Jan 31, 2017
This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions to be more agile, more productive, and protected against threats to security and continuity for today and tomorrow.
Tags : 
cloud, cloud computing, data, security, data security
    
Grey Matter
White Paper Published By: Grey Matter     Published Date: Jan 13, 2017
This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions to be more agile, more productive, and protected against threats to security and continuity for today and tomorrow.
Tags : 
cloud, cloud computing, data, security, data security
    
Grey Matter
Case Study Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security
    
Astaro
White Paper Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware
    
Mimecast
White Paper Published By: Diligent     Published Date: Aug 05, 2016
This article provides an evaluation framework for directors and senior management. Focus is on three main factors: where data is stored, the strength of locks that provide access, and the control of keys for entry.
Tags : 
cybersecurity, security management, security, access control, anti spam
    
Diligent
White Paper Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Download this paper now to learn how you can prevent such an attack and protect your business
Tags : 
prevent cyber-attacks, cyber-attacks, security application, security, anti spam
    
Kaspersky Lab Australia and New Zealand
White Paper Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security
    
Kaspersky Lab Australia and New Zealand
White Paper Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datenstze durch Verletzungen der Datenintegritt kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschtzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorflle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, whrend Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application, anti spam
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der whrend des vergangenen Jahres verzeichneten ffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverstndliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen berblick ber das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financires et juridiques des cyber-incidents hautement mdiatiss de lanne dernire ont envoy un message clair : le vol de donnes est trop important pour que le Conseil dadministration ne soit pas impliqu. Le rapport Cyberscurit et prvention du vol de donnes fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour valuer les mesures de scurit actuelles de sa socit.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The Cybersecurity and Data Theft Prevention report provides a non-technical overview every board of directors can use to assess their organizations security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Je lnger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist mglich - und desto grer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz fr Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mgliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafr, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden knnen.
Tags : 
cyber security, security application, security, cybersecurity, data prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso pi di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report Data Theft Prevention si concentra su come innovare in completa sicurezza da una prospettiva pi ampia, pi mirata e pi intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application, anti spam
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de donnes ont compromis plus de 700 millions de dossiers, engendrant des pertes financires estimes au moins 400 millions $, et la frquence des incidents lis la scurit est passe 66 pour cent. Mais ne laissez pas la crainte touffer votre croissance. Le rapport sur la prvention contre le vol de donnes se penche principalement sur la manire de vous protger lorsque vous innovez, mais selon une perspective plus large en termes de porte et plus intelligente dans lapplication.
Tags : 
security, data theft prevention, data security, security application, anti spam
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
cyber attack, security, security application, cybersecurity, cybersecurity
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness seeing the extent of your user behavior starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application
    
Forcepoint
White Paper Published By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : 
service providers, ddos, security, cyber security, cyber threats
    
Cisco
White Paper Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
    
Akamai Technologies
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks
    
Logrhythm
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
This eBook looks at different threat sharing initiatives and alliances as well as explores how automating intelligence sharing will significantly accelerate detection and response times.
Tags : 
cyberthreat, cyberthreat intelligence, security, it solutions, cti companies
    
Logrhythm
White Paper Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : 
cyberattacks, security, data security, cryptographic keys, digital certificates
    
Venafi
Case Study Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection
    
Venafi
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.